πŸŒ€Ethical Hacking Methodology

Ethical Hacking known as white-hat hacker or penetration testing or vulnerable assessment. What make it different from hackers, ethical hacking have structured approach and approved by company/victim.

The Five Structure Approach

  1. Reconnaissance

  2. Scanning

  3. Gaining Access

  4. Maintaining Access

  5. Covering Tracks

Reconnaissance

  • Any move or step taken where all information being gathered.

  • Using passive information gathering

  • No triggered.

Scanning

  • Start active information gathering

  • Focus on discover any loop hole (vulnerabilities, services or open ports).

  • To identify potention weakness.

Gaining Access

  • Attempt to gain access to target.

  • Focus on vulnerability found in scanning method.

Maintaining Access

  • Maintain access in target system.

  • Install backdoor or remote access

Covering Track

  • Remove any traces or action.

  • Leaving no evidence.

Last updated